Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 05:23

General

  • Target

    f9ad46d78dfc0e9d6bc654004b14c475766b90c2884c7c28319fb84ba0a8433a.exe

  • Size

    11.4MB

  • MD5

    9ca0678dc602abdf7ed9c8994f0056e8

  • SHA1

    3d7abcbe0ccae6dd323e46aa450b33e41f1b87b3

  • SHA256

    f9ad46d78dfc0e9d6bc654004b14c475766b90c2884c7c28319fb84ba0a8433a

  • SHA512

    6aafb008ce337de18a71a4d592e230760145e2771e4767e9c115240e934c882f831e91895aa60ec698a6b3d042fe5c1625da04b588f52d16d2d0f6ca65731a1e

  • SSDEEP

    196608:8+V1Zf0MG+PZxHIyICzcPz5ZcJ1pI/cIyLdvpfbaXmWUNZTVwho87dl+egc9ygt:HNX7PZRzc3cJ1awZpDNZhwN7b+egkygt

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9ad46d78dfc0e9d6bc654004b14c475766b90c2884c7c28319fb84ba0a8433a.exe
    "C:\Users\Admin\AppData\Local\Temp\f9ad46d78dfc0e9d6bc654004b14c475766b90c2884c7c28319fb84ba0a8433a.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://docs.qq.com/doc/DV3ZEZ3BGSkdkY3JI
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:620
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdae9c46f8,0x7ffdae9c4708,0x7ffdae9c4718
        3⤵
          PID:1608
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,14725907709790891349,6408304783976507097,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
          3⤵
            PID:3120
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,14725907709790891349,6408304783976507097,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1828
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,14725907709790891349,6408304783976507097,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:8
            3⤵
              PID:2252
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14725907709790891349,6408304783976507097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
              3⤵
                PID:1620
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14725907709790891349,6408304783976507097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
                3⤵
                  PID:4680
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,14725907709790891349,6408304783976507097,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3156 /prefetch:2
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1920
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:3860
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:2348

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  34d2c4f40f47672ecdf6f66fea242f4a

                  SHA1

                  4bcad62542aeb44cae38a907d8b5a8604115ada2

                  SHA256

                  b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33

                  SHA512

                  50fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  8749e21d9d0a17dac32d5aa2027f7a75

                  SHA1

                  a5d555f8b035c7938a4a864e89218c0402ab7cde

                  SHA256

                  915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304

                  SHA512

                  c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                  Filesize

                  2KB

                  MD5

                  fb4213291cb9d4fb36812475b2e276dd

                  SHA1

                  81488462ebe8e8a3048f97cf20271191e3b21766

                  SHA256

                  8754179c948e91ca4a262fa140a79411bd12edf515f90236fd99a7d069b13aec

                  SHA512

                  a86bc2bb0344f3051c88eab0710d54929186a5901584509b5ba23e8192935200fc62cab1b34da5b95b5f4ae3cb2accbc882dbebf8280e5f16bcece99f746f62c

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                  Filesize

                  794B

                  MD5

                  efdbfd540d4269a9e448488c2ed343f8

                  SHA1

                  ebbe81ed5c65eeadd53f4b119b93c45d5b0bc10d

                  SHA256

                  f20564cb4e7f4c25cb6dd8191aa835e90964b2cb558e9689c8970469e50ea83e

                  SHA512

                  ceccf48e38aa52372a3744b799fdd240a40f273a4e8fc519cd1144fa65f6285efd345278afaa53c8e4084f12f5a582b35cc4b24a5a24bfdc5f9347369fd68175

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  5KB

                  MD5

                  4418a0f0161de5d45675ddc8ca86930c

                  SHA1

                  3ccfaf2e784b7efb17fa48186ec17a3ae7bf1327

                  SHA256

                  3f5a4da7ef3db33d1651595a154aea85c0f2fc81927e35d1c5d20666f0a49f98

                  SHA512

                  c54f86801f38a9d0973c6c7ec551c28b05567add6ac683607221d6ea464640b8a328e1ef096678a45808dce07224fa7daeed231da509e5ba0fab185839f6e8dd

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  99ed77afefcec2ff066c40f5a95048b5

                  SHA1

                  44cc8b1fcd09ed777a1171b872bc83088e913475

                  SHA256

                  758aae0d331b83e30bac6c7b5e8fb058305c305fa2e1eed74ed73eee2b6e3e6e

                  SHA512

                  3f686aa87a4182fba1348c5e315cf4057c60263c54780e210a90b68f89ec3945954622c1759c569f94fa45fda13436960660b58c7d6705f0746e273ac50e7b64

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\3c6b1189-78b9-41c7-ab8c-f98c5049d884\index-dir\the-real-index

                  Filesize

                  72B

                  MD5

                  7b629152e03e65801c3bdfddaea170e1

                  SHA1

                  4e65c317da1c97cf5cd32825813fd188d2b9ff0b

                  SHA256

                  dd0916668c6eb27ef2a15c6a3056d1a344269e3989bd3f3242e4f1516e816727

                  SHA512

                  d9336626ff8da9b4aed63c24a3d7af63bb38d8f3b7d1d0d8cd98a471596e5b4ec84b20a3b39ae2415e8006a3edfb75fd2e797b1eb950640d160ee05bcce9160b

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\3c6b1189-78b9-41c7-ab8c-f98c5049d884\index-dir\the-real-index~RFe582ac4.TMP

                  Filesize

                  48B

                  MD5

                  74317443cdd2374996d4ad54bda049ea

                  SHA1

                  d0aece5c5b05c55a60a3e71a2619c953afbdf7c2

                  SHA256

                  6a0c77e562d3956b1d78abe46f0920ed1d6d84d8322aea225b416359dee394ff

                  SHA512

                  ad37708117876b7c5a3af3ec9cb2d78305d608d046f16714d90d33c07dedb35f25002b899e33419520127c7f86e7ebd59e7ae3649bbd3fcce843d8c422091248

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\index.txt

                  Filesize

                  97B

                  MD5

                  5f6a7f9ae29ed7deec4ebd8c92c71abf

                  SHA1

                  5ab149bf10424bd5035dd2f7f27feeb62a76f371

                  SHA256

                  15beb9c4f33e3143e6f4b0bd33a04a302b2896ef2f79f836d42943746e9bf1a3

                  SHA512

                  0eb1a85a2e8c6bf58211b09158e97591b5a933b138f20414de8ccf4d0709e881369be0d4b6ae6190636c376a5fc3707c0956b357406745c8f929fb3cb27333de

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\index.txt

                  Filesize

                  91B

                  MD5

                  b0f83cae77bee62ddce89e4eb539929e

                  SHA1

                  636c236852489fc0a77bb03537eb29c945a56cde

                  SHA256

                  a213406978cf9075ae6b972d3170205a8c5aa61df74120492cc50759c19b87f6

                  SHA512

                  50c845d6c2ef914422707a2c29a595d1cb5e6e581b121d397feab645d004c87cff0e3515c1c04fb2ebb2b9a2f94bafc1c6df4d05415160fcd89d3bf750b4f95c

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  9853573e9a36cef896fb4606f72b7f6d

                  SHA1

                  bdb347162662cf95e2b6bf35ac9e36b4f80509ca

                  SHA256

                  6f76ed08d7f9c453ce133159ea5df06a5cb3688ede23e1f2039f763b6e617dcd

                  SHA512

                  c68a7e1a348dc49adb5ef83fc7f0b6d9a11887f56d95eccad70f560358d813cd3b92fd53649726c3b5c3414a344dde1d3f042bdcd7bd9bf8590ce6d2357986db

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  fccf35a67283a41f2b7e4c4acb026a2e

                  SHA1

                  f806792ac625ad3ea1eb5a2c3b7fbdfcd3ef6c47

                  SHA256

                  d19385245b5ed377b0eeb42332e419bc618d2268dd3e464dcc6d280e2ff3fc3a

                  SHA512

                  7615aa5a401f438e0387fe67572848a7f248292b7db9153deca03840b9a1e79b79d128db2beda6a1b027d594579d55c2b7fa1372a60f33a6d1af751310b0baa2

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  cde6995724dc01c9d204959e12f619ff

                  SHA1

                  0f0e7a0b05f7e0b6c608bab9bee179679dc63a4b

                  SHA256

                  4ef808163737de991dcde7d57a136788ac65eef20de4b32c60566e35303c2340

                  SHA512

                  cc25e398a98c94a9f5d090948b5b912dba3a909b8ed67dbaf18874a4cc671ffdf85d77e96c32b6b0a59b06f20b0d08e37a1a7e6adf3bc9a01c744bf4027f15dd

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  b70e65befb0ee9f9bc09627ef5e7c41c

                  SHA1

                  8b01918bf3462bdfb98b11756999c1785031c10a

                  SHA256

                  4801dfa3eab961c91e553f414977777031481b3969769b1035173fe5b7e32b44

                  SHA512

                  229a6791e191b14d42319ce0715304e4c9d60eccb100aefbd6bc15a18ddea2097aae767c16a8c82246208110536e6e7ded07ffba16f7b2d9eab32faa10dce840

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  3b8d2299164f439b708c16257477b8ea

                  SHA1

                  c78b539940f9718caa888f785fe6d6a0e5a678b3

                  SHA256

                  baab4fe4b0add43e63664fd7db8379465fca005accdbeddebbeb3a670cec28ce

                  SHA512

                  093dd9e64e1581243af1270e2c5079ebedc30ca446f87f661d70f3c8cf34ee5b67d5b2fa3b4886fa08c5ad7c6ecac42a1b782a2a2712945e139f5c7b1892847f

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe581eae.TMP

                  Filesize

                  203B

                  MD5

                  459512d4bd44187365831602d996e207

                  SHA1

                  34a60f4e09673a7ee8165d5361f50e06b539619c

                  SHA256

                  cc66710a81f9d84084f4e5e386ac6239f7c6cd09e89d9d8f41a39b021c5a1c34

                  SHA512

                  985ec8c75720a6221cb018a1e6ad290e70accb16d24a79ef1439d4cbb9f4b2ac06fd981af1673643f64244439cd0e62b60be12fa65c7c7dc7fb74912e184c3c7

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  10KB

                  MD5

                  b4eb4ded29d38f399501ebefc695197f

                  SHA1

                  ea5c7816699cb28dc345963737122074718a4be2

                  SHA256

                  fc9517030e2f3bbb9790de75a64ddd968fce4e10bc1e037042a5b63ae19d237a

                  SHA512

                  1dc6e57e69595fd7e1af87692fb538a2d4ff5dadd218df5ce3968da172745fb1e20755ba38330c72257135dd3be520d158f4cd9ce3504c349edbd58b58f5d848

                • C:\Users\Admin\AppData\Roaming\Downloader\libcurl.dll

                  Filesize

                  729KB

                  MD5

                  f28f2bc74c40804a95c870ea710d5371

                  SHA1

                  8654243c7de98a74ede2bcf45e8506f92e77d6fa

                  SHA256

                  cf6e5d1db6eb6965e639db3bdffaee8eb38c9a603ed5317e2e7c92e8ea7bdc1d

                  SHA512

                  2542aad8117f91a039d27fe4d844675dd88dc267cc8643c6b2820fc05ab1b02ee05c77d7bdc6d9f56a992572ab67bfaab32bda3b03947a2c7175cd16fbf5726b

                • memory/1944-8-0x00000000772F0000-0x00000000772F1000-memory.dmp

                  Filesize

                  4KB

                • memory/1944-24-0x0000000000400000-0x0000000001A91000-memory.dmp

                  Filesize

                  22.6MB

                • memory/1944-25-0x0000000006A60000-0x0000000006A7A000-memory.dmp

                  Filesize

                  104KB

                • memory/1944-26-0x00000000772D0000-0x00000000773C0000-memory.dmp

                  Filesize

                  960KB

                • memory/1944-21-0x0000000000400000-0x0000000001A91000-memory.dmp

                  Filesize

                  22.6MB

                • memory/1944-18-0x00000000772D0000-0x00000000773C0000-memory.dmp

                  Filesize

                  960KB

                • memory/1944-19-0x00000000772D0000-0x00000000773C0000-memory.dmp

                  Filesize

                  960KB

                • memory/1944-20-0x00000000772D0000-0x00000000773C0000-memory.dmp

                  Filesize

                  960KB

                • memory/1944-17-0x00000000772D0000-0x00000000773C0000-memory.dmp

                  Filesize

                  960KB

                • memory/1944-0-0x0000000000400000-0x0000000001A91000-memory.dmp

                  Filesize

                  22.6MB

                • memory/1944-10-0x00000000772D0000-0x00000000773C0000-memory.dmp

                  Filesize

                  960KB

                • memory/1944-11-0x00000000772D0000-0x00000000773C0000-memory.dmp

                  Filesize

                  960KB

                • memory/1944-12-0x00000000772D0000-0x00000000773C0000-memory.dmp

                  Filesize

                  960KB

                • memory/1944-7-0x0000000006C20000-0x0000000006CDE000-memory.dmp

                  Filesize

                  760KB

                • memory/1944-6-0x0000000006A60000-0x0000000006A7A000-memory.dmp

                  Filesize

                  104KB

                • memory/1944-2-0x0000000010000000-0x0000000010116000-memory.dmp

                  Filesize

                  1.1MB